7 research outputs found

    Nothing More Real Than Nothing: The Unnamable as Self-Annihilating Fiction

    Get PDF
    Nature abhors nothing; it is the mind which cannot bear to live in a state of suspension, in absence, in a vacuum. The very existence of fiction testifies to man\u27s need for intricate models through which he may fashion and explore his life. In the last eighty years, a great deal of research has been devoted to discovering the ways in which fictions are structured; the ways, that is, in which literature replaces chaos not with content, but with form; with elaborate verbal webs that hold in abeyance the hollow of life without language. Russian formalism, mythcriticism like Northrop Frye\u27s, structuralism, poststructuralism and phenomenological analysis have clearly demonstrated the fact that literature is shaped by unconscious conventions on the levels of genre, plot and character, and in the deployment of multiple pairs of binary oppositions which create a kind of symbolic code within the work. Perhaps most significantly, theorists like Roland Barthes and Jonathan Culler have begun to make explicit the interpretive conventions which readers bring to a work and the ways in which these conventions influence their reading. Unlike most fictions, however, The Unnamable radically subverts many of these conventions, consequently invalidating the implicit narrative contracts signed between reader and author. Since its publication in 1953, The Unnamable has provoked hundreds of pages of comment; yet few English-speaking critics have thought closely about the specific ways in which the novel undermines narrative and linguistic conventions. Instead, The Unnamable has traditionally been treated either as Beckett\u27s bleak vision of the human condition, or as a reflection of his philosophic thought

    The Cryptographic Imagination

    Get PDF
    Originally published in 1996. In The Cryptographic Imagination, Shawn Rosenheim uses the writings of Edgar Allan Poe to pose a set of questions pertaining to literary genre, cultural modernity, and technology. Rosenheim argues that Poe's cryptographic writing—his essays on cryptography and the short stories that grew out of them—requires that we rethink the relation of poststructural criticism to Poe's texts and, more generally, reconsider the relation of literature to communication. Cryptography serves not only as a template for the language, character, and themes of much of Poe's late fiction (including his creation, the detective story) but also as a "secret history" of literary modernity itself. "Both postwar fiction and literary criticism," the author writes, "are deeply indebted to the rise of cryptography in World War II." Still more surprising, in Rosenheim's view, Poe is not merely a source for such literary instances of cryptography as the codes in Conan Doyle's "The Dancing-Men" or in Jules Verne, but, through his effect on real cryptographers, Poe's writing influenced the outcome of World War II and the development of the Cold War. However unlikely such ideas sound, The Cryptographic Imagination offers compelling evidence that Poe's cryptographic writing clarifies one important avenue by which the twentieth century called itself into being. "The strength of Rosenheim's work extends to a revisionistic understanding of the entirety of literary history (as a repression of cryptography) and then, in a breathtaking shift of register, interlinks Poe's exercises in cryptography with the hyperreality of the CIA, the Cold War, and the Internet. What enables this extensive range of applications is the stipulated tension Rosenheim discerns in the relationship between the forms of the literary imagination and the condition of its mode of production. Cryptography, in this account, names the technology of literary production—the diacritical relationship between decoding and encoding—that the literary imagination dissimulates as hieroglyphics—the hermeneutic relationship between a sign and its content."—Donald E. Pease, Dartmouth Colleg

    Code wars: steganography, signals intelligence, and terrorism

    Get PDF
    This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this paper is that terrorists are likely to employ low-tech steganography such as semagrams and null ciphers instead
    corecore